Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-1010190

Опубликовано: 24 июл. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.5

Описание

mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

released

1.2.1-1
disco

released

1.2.1-1
eoan

released

1.2.1-1
esm-apps/bionic

needed

esm-apps/focal

released

1.2.1-1
esm-apps/jammy

released

1.2.1-1
esm-apps/noble

released

1.2.1-1
esm-apps/xenial

needed

esm-infra-legacy/trusty

DNE

Показывать по

EPSS

Процентиль: 38%
0.00165
Низкий

4.3 Medium

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
redhat
больше 6 лет назад

mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.

CVSS3: 5.5
nvd
больше 6 лет назад

mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.

CVSS3: 5.5
debian
больше 6 лет назад

mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact i ...

suse-cvrf
почти 6 лет назад

Security update for mgetty

suse-cvrf
почти 6 лет назад

Security update for mgetty

EPSS

Процентиль: 38%
0.00165
Низкий

4.3 Medium

CVSS2

5.5 Medium

CVSS3